Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DQDB

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

DQDB

Network Security
What is DQDB?

• Distributed Queue Dual Bus


• DQDB is a DLL comm. protocol for MAN
• Unlike FDDI, DQDB is an IEEE standard: 802.6
• Designed for both voice & video
• Topology used: Dual Bus - uses 2 unidirectional logical
buses
• Extend up to 30 miles at 34-55 Mbps
• Uses optical fibre links
• Queued-packet distributed switch (QPSX) algorithm

Network Security
About DQDB

• Works on Data-link layer (specially in MAC sub-layer)


• Used in data, voice and video transmissions
• Used in data over cable services
• Based on Cell Relay Technology (like ATM)
• Provides connection-oriented, connection less services &
asynchronous services

Network Security
Few technical facts of DQDB

• Distance up to 200 KM
• Medium: Copper or Fiber
• At distance up to 160 KM approx speed is 44.73 Mbps
(Copper)
• At distance up to 100 KM approx speed is 150 Mbps (Fiber)
• Transmission Rate: 34 Mbps to 150 Mbps

Network Security
DQDB Architecture

• Each bus supports traffic in only one direction


• Beginning of bus is denoted by a square and end by a triangle
• Bus B traffic moves from right to left and Bus A traffic from left to
right
• Each bus connects to stations directly through input and output
ports
Network Security
DQDB Architecture (Cont…)

• The DQDB is composed of a two bus lines with stations


attached to both and a cell (Empty slots) generator at the
start of each bus.

• The buses run in parallel in such a fashion as to allow the


cells generated to travel across the stations in opposite
directions.

• The cell generator (head-end) is constantly producing


empty cells consisting of fifty-three bytes (a five byte
header and a forty-eight byte payload).

Network Security
Upstream & Downstream
• As Bus A is configured
• Stations 2 & 3 are considered to be upstream w.r.t station 1
• Stations 1 & 2 are considered to be downstream w.r.t. station 3
• As Bus B is configured
• Station 2 & 3 are considered to be downstream w.r.t. station 1
• Stations 1 & 2 are considered to be upstream w.r.t. station 3

Network Security
DQDB working

• Head-ends generate fixed size cells in both directions (cell


generators)
• To transmit, a host must know whether the destination is
to its right or its left
• If right, the host must send on left bus

• If left, the host must send on the right bus

• A “Distributed Queue” is used to make sure that cells are


transmitted on a first-come first-serve basis

Network Security
DQDB Cell Format
 Segment Type (ST): Identify the cell as one of the following:
• Single Segment
• First Segment
• Intermediate Segment
• Last Segment
 Message Identifier (MID): MID is the same for all DQDB cells from
the same MAC frame. This allows the identification of intermediate
segments.
 Information: Actual Data
 Length (LEN): The length of the information field.
 CRC: For error correction

Network Security
DQDB cell header
Access Control Field (ACF):
This contains the BUSY and REQUEST bits that are used in the
operation of the DQDB. The BUSY bit indicates the cell is in use. The
REQUEST bit is set in a cell by a node that is waiting to transmit.

Virtual Channel Identifier (VCI):


This is used to identify a virtual channel address.

Payload type (PT): 1st bit Data or Control ; 2nd bit


congestion.

Cell loss priority (CLP): Retain / Discard on


congestion.

Header Error Control (HEC): CRC for the


header.

Network Security

You might also like